1 |
This is critical in many applications and includes a language (Java, JavaScript) as well Object Model implementations
|
2 |
Security can be implemented simply as a user name / password but there are several special features
-
Encryption -- keeping information secret
-
Authentication -- identifying and authorizing individuals to access particular capabilities
-
Different technical approaches -- especially Kerberos and Public Key Infrastructure
|
3 |
There are a spate of stories about viruses, hackers and security leaks of computer information from government facilities
|